>
questions
List of practice Questions
Recursive algorithm like Merge Sort cannot use Dynamic Programming because:
TANCET - 2024
TANCET
Computer Science and IT Engineering
Algorithm design techniques
A greedy algorithm is an approach for solving a problem by:
TANCET - 2024
TANCET
Computer Science and IT Engineering
Algorithm design techniques
In the absolute addressing mode:
TANCET - 2024
TANCET
Computer Science and IT Engineering
Computer Organization and Architecture
The elimination stage of WAR and WAW hazards is often called:
TANCET - 2024
TANCET
Computer Science and IT Engineering
Computer Organization and Architecture
What is the formula for Hit Ratio?
TANCET - 2024
TANCET
Computer Science and IT Engineering
Computer Organization and Architecture
The Sun Microsystems processors usually follow ________ architecture.
TANCET - 2024
TANCET
Computer Science and IT Engineering
Computer Organization and Architecture
The number of additions required to compute N-point DFT using radix-2 FFT is given by:
TANCET - 2024
TANCET
Computer Science and IT Engineering
Digital Signal Processing
The transfer function of a Butterworth filter is given by:
TANCET - 2024
TANCET
Computer Science and IT Engineering
Digital Signal Processing
Fast Fourier Transform algorithms exploit:
TANCET - 2024
TANCET
Computer Science and IT Engineering
Digital Signal Processing
Low pass Butterworth filters are:
TANCET - 2024
TANCET
Computer Science and IT Engineering
Digital Signal Processing
What is the maximum size of data that the application layer can pass on to the TCP layer below?
TANCET - 2024
TANCET
Computer Science and IT Engineering
Computer Networks
A channel has \( B = 4 \) KHz, what is the channel capacity having the signal-to-noise ratio of 20 dB?
TANCET - 2024
TANCET
Computer Science and IT Engineering
Computer Networks
A bit-stuffing based framing protocol uses an 8-bit delimiter pattern of 01111110. If the output bit-string after stuffing is 01111100101, then the input bit-string is
TANCET - 2024
TANCET
Computer Science and IT Engineering
Computer Networks
If 5 TCP segments of 100-byte MSS are sent consecutively, starting with sequence number 101, 201, 301, 401, and 501, and if the first segment is lost, the ACKs returned will have ACK numbers as:
TANCET - 2024
TANCET
Computer Science and IT Engineering
Computer Networks
The CREATE TRIGGER statement is used to create the trigger. THE _________ clause specifies the table name on which the trigger is to be attached. The ___________ pecifies that this is an AFTER INSERT trigger.
TANCET - 2024
TANCET
Computer Science and IT Engineering
Database Management Systems
Which of the following is a semi join?
TANCET - 2024
TANCET
Computer Science and IT Engineering
Database Management Systems
Which of the following is not a clustering method?
TANCET - 2024
TANCET
Computer Science and IT Engineering
Database Management Systems
Which of the following is the characteristic of RAID-5?
TANCET - 2024
TANCET
Computer Science and IT Engineering
Database Management Systems
All activities lying on the critical path have slack time equal to:
TANCET - 2024
TANCET
Computer Science and IT Engineering
Software Engineering Methodologies
If \( P \) is risk probability, \( L \) is loss, then Risk Exposure (RE) is computed as:
TANCET - 2024
TANCET
Computer Science and IT Engineering
Software Engineering Methodologies
For a function of two variables, boundary value analysis yields:
TANCET - 2024
TANCET
Computer Science and IT Engineering
Software Engineering Methodologies
Which test refers to the retesting of a unit, integration and system after modification, in order to ascertain that the changes have not introduced new faults?
TANCET - 2024
TANCET
Computer Science and IT Engineering
Software Engineering Methodologies
The number of levels used in defining a knowledge-based agent is
TANCET - 2024
TANCET
Computer Science and IT Engineering
Artificial Intelligence
The reason for the uncertainty in the Wumpus World Problem is that the agent’s sensor provides only the following information.
TANCET - 2024
TANCET
Computer Science and IT Engineering
Artificial Intelligence
Which one of the following is the ability to represent all kinds of knowledge that are needed in that domain?
TANCET - 2024
TANCET
Computer Science and IT Engineering
Artificial Intelligence
Prev
1
...
1834
1835
1836
1837
1838
...
6330
Next